
The mass-usage that it currently facilitates1. The development of inter-networking that led to the “internet” was not designed for TOR as an anonymity tool, and the analysis of TOR traffic in a law enforcement Lastly, some recommendations will be given regarding the use of The results of the trafficĪnalysis will be detailed next providing an insight into TOR’s use as an anonymity tool Next, the methodology utilised to test TOR’s ability to provide anonymity will beĮxplained, including traffic capture and analysis techniques. Secondly, TOR itself will be discussedĮxplaining the technology behind the onion router and how it provides anonymity. Through traffic analysisĪnd social engineering it is theorised that the originating IP address can still be learntįrom the remnants of the TOR network traffic.īefore discussing the analysis of TOR traffic, firstly anonymity on the internet will beĮxplained providing a brief background into the different techniques that have been Traffic will be distinguishable from regular internet traffic. Specifically, through the analysis of network packets, it is the hypothesis that TOR Provides when the network traffic is subject to traffic analysis techniques. This paper will examine the extent of anonymity that TOR One of the most common technologies that allows for anonymity is Various technologies exist that assist internet users in maintaining their anonymity Recommendations are given regarding the usage of TOR to mitigate the behaviouralĪctions of users that have inadvertently violated their anonymity.ĪBSTRACT. In order for a forensic analysis of TOR network packets to take place. These results are put into a law enforcement context A high-level and a low-level traffic analysis are conducted resulting in some Identifying markers is via a packet comparison of TOR and non-TOR identical network The methodology utilised to locate any TOR

Of the TOR system is also conducted discussing its development, its features, its Overview of anonymity systems on the internet is provided. Order to identify any markers of TOR usage on the network packets. This paper examines the traffic analysis of “The Onion Router” (TOR) network in

TOR Packet Analysis - Locating Identifying Markers
